{"id":9019,"date":"2013-09-30T12:56:59","date_gmt":"2013-09-30T12:56:59","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2794304"},"modified":"2013-09-30T12:56:59","modified_gmt":"2013-09-30T12:56:59","slug":"secure-cloud-backup-and-data-transfer-how-its-done","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/secure-cloud-backup-and-data-transfer-how-its-done\/","title":{"rendered":"Secure Cloud Backup and Data Transfer: How It\u2019s Done"},"content":{"rendered":"<p>The Internet is a dangerous place. There&#8217;s a new story on Ars Technica about a corporate or government hack almost everyday. So for those interested in how an enterprise-grade secure cloud backup solution handles data encryption, here is some background on a few of the security protocols used to protect customer data here at Zetta:<\/p>\n<p>Secure Sockets Layer (SSL) \/ Transport Layer Security (TLS)<br \/>\nSSL is an Internet security protocol developed by Netscape in the late &#8217;90s that is incorporated in browsers and web servers. The protocol uses the RSA public-key\/private-key encryption system and digital certificates to establish a secure connection between the client and server over which data can be transmitted.<\/p>\n<p>SSL has recently evolved into the TLS protocol, but both protocols are still in use. When you see a website that starts with https instead of http, it requires an SSL\/TLS connection. Both protocols are IETF standards. While the SSL Working Group is no longer active, the TLS Working Group is, and has issued a number of documents on the protocol since the start of the year. SSL\/TSL differs from a complementary IETF protocol Secure HTTP (S-HTTP) in that S-HTTP is designed for sending single messages, while SSL\/TSL creates a secure connection over which any amount of data can be sent.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2794304\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet is a dangerous place. There&#8217;s a new story on Ars Technica about a corporate or government hack almost everyday. So for those interested in how an enterprise-grade secure cloud backup solution handles data encryption, here is some backgroun&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-9019","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/9019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=9019"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/9019\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=9019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=9019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=9019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}